Q. |
In 1999, the Melissa virus was a widely publicised:____________?
Show Answer
|
Q. |
An intentionally disruptive program that spreads from program to program or from disk to disk is known as a_____________?
D.
Time-related bomb sequence
Show Answer
|
Q. |
A program that performs a useful task while simultaneously allowing destructive acts is a___________?
Show Answer
|
Q. |
Malicious software is known as____________?
Show Answer
|
Q. |
Collecting personal information and effectively posing as another individual is known as the crime of_____________?
Show Answer
|
Q. |
The common name for the crime of stealing passwords is____________?
Show Answer
|
Q. |
The typical computer criminal is a(n)____________?
B.
Trusted employee with no criminal record.
C.
Trusted employee with a long, but unknown criminal record.
D.
Overseas young cracker.
Answer :
Trusted employee with no criminal record.
Show Answer
|
Q. |
The computer abbreviation KB usually means____________?
Show Answer
|
Q. |
Which of the following is not a storage medium?
Show Answer
|
Q. |
Large transaction processing systems in automated organisations use___________?
Answer :
Batch Processing
Show Answer
|